We are in the process of rolling out several sites to cover things from mobile app development to photography, plus much more.
We love hearing from you with suggestions, comments and feedback. Please send us a quick note.

Articles tagged with: trojan

Researchers at CA Technologies have recently uncovered a new Android Trojan that records both incoming and outgoing calls, and the user never even knows whats happening. The app claims to be a useful package, and is dubbed Android System Messenger (sounds important, right?).

The program runs quietly in the background while the user goes about their normal routine, and as we have mentioned, records the audio from all incoming and outgoing conversations in a compressed AMR format.

Google has just detected a malware on users’ system which causes unnecessary search traffic on the servers. Google has tried to overcome this problem by sending a notification on every computer that might be infected.

Google found out that this unusual traffic was due to a malicious software on users’ computers. Google claims that this malware might have infected users’ computer through other websites which the user himself might be unaware of. Hence, by notifying the user on their Google search page, Google can make the user to take an action against it.

Lookout Mobile Security has released an Android Application for Smartphones known as Mobile Security API to fight against any kind of Malware. Though our computers might not be safe, but Lookout Security has made our smartphones safe so that we can enjoy a threat free environment.

This application eliminates any threat of Malware by keeping track of every Application uploaded by a developer. So in a sense, it compromises a malware at the time of its origin and never lets it enter the cloud of applications.

The people responsible for the horrible ZeuS botnet have started exploiting a vulnerability in mobile banking that allows them to steal bank passwords. The spyware app is a Trojan called Zitmo and it has recently been modified to attack Android devices.

The malware works by posing as bank activation software, in where it preys upon its victims and steals all your bank details as you bank online.

If you’re feeling a little anxious about all the malware that has been showing up on Androids marketplace, you may be a little concerned over your iPhone as well. Although Apple is known to generally have less malware than PCs, that doesn’t mean they are immune to the baddies.

A new app called VirusBarrier seeks to protect your iOS device (ipod touch, iphone, or ipad). The maker of this app is actually from Intego, and once installed and launched, VirusBarrier performs a deep scan of all the files stored on your iOS gadget.

It recently came to light that a security hole in iOS means users could potentially find their iDevices infected with malware if they open dodgy attachments.

Users are particularly vulnerable when they view Portable Document Format, or PDF, files, which give attackers an opportunity to infect the devices with malicious software, giving them administrative rights to the device.

A new and sophisticated botnet has infected more than four million computers in just three months, and it is almost “indestructible”, say security researchers. The botnet, called TDL-4, targets PCs running on Windows and tries hard to avoid detection and even harder to shut down.

TDL-4 is the name for both the Trojan virus that affects machines and the network of compromised computers. “It is the most sophisticated threat today… practically indestructible,” Kaspersky Lab’s security researchers Sergey Golovanov and Igor Soumenkov have stated in a detailed analysis released recently.

A popular social media service in China with 140 million active users was hit by a worm earlier this week that is similar to MySpace and Twitter worms that have been unleashed in the past. The worm first appeared on Tuesday night on Beijing time.

The affected posts displayed a malicious link with enticing messages such as “Software to listen to other people’s phones.” The link would then re-post and send out private messages circulating the link once again every time it was clicked.

Unfortunately, some people take advantage of hacking frenzies like the ones we’ve been facing, to create hoax threats and scares because they know that contextual cues will help the hoax be believable.

It doesn’t help that the media preys on fear of its viewers, because fear sells. People innately seek to be fearful of something because it has been beneficial to the survival of our ancestors, and thus, we carry the same trait.

Researchers at SophosLabs have recently detected a malicious e-mail that has been spammed all over the globe, offering computer users of a coupon for a free McDonalds product.

The “From” address designates [email protected] and the author is “Your McDonalds.” The author’s ‘name’ should be the first clue of legitimacy but if that doesn’t warn you, the strange English should drop a few clues, along with the inappropriately placed exclamation marks.